Results 21 to 30 of about 16,624 (253)
On White-box Cryptography and Obfuscation
We study the relationship between obfuscation and white-box cryptography. We capture the requirements of any white-box primitive using a \emph{White-Box Property (WBP)} and give some negative/positive results. Loosely speaking, the WBP is defined for some scheme and a security notion (we call the pair a \emph{specification}), and implies that w.r.t ...
Amitabh Saxena, Brecht Wyseur
openaire +2 more sources
Cryptanalysis of ARX-based White-box Implementations
At CRYPTO’22, Ranea, Vandersmissen, and Preneel proposed a new way to design white-box implementations of ARX-based ciphers using so-called implicit functions and quadratic-affine encodings. They suggest the Speck block-cipher as an example target.
Alex Biryukov +2 more
doaj +1 more source
White-Box Cryptography and an AES Implementation [PDF]
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the execution environment, or where co-located with malicious software. Yet current trends point to increasing usage in environments so threatened.
Stanley Chow +3 more
openaire +1 more source
Towards Security Notions for White-Box Cryptography [PDF]
While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on software implementations of cryptographic primitives in an application. The aim of WBC is to resist attacks from an adversary having access to some `executable' code with an embedded secret ...
Saxena, Amitabh +2 more
openaire +1 more source
DWB-AES: an implementation of dynamic white-box based on AES
The resources of IoT devices are limited.Therefore, security, flexibility and lightweight cryptographic modules are required.The idea of white-box cryptography can meet the needs of IoT devices.In common AES white-box implementations, keys are bound to ...
Bin WANG +3 more
doaj +2 more sources
A Medical Image Encryption Scheme for Secure Fingerprint-Based Authenticated Transmission
Secure transmission of medical images and medical data is essential in healthcare systems, both in telemedicine and AI approaches. The compromise of images and medical data could affect patient privacy and the accuracy of diagnosis.
Francesco Castro +2 more
doaj +1 more source
Hardware Implementation of the GPS authentication [PDF]
In this paper, we explore new area/throughput trade- offs for the Girault, Poupard and Stern authentication protocol (GPS). This authentication protocol was selected in the NESSIE competition and is even part of the standard ISO/IEC 9798. The originality
Dardaillon, Mickaël +2 more
core +4 more sources
White-Box Cryptography: Don’t Forget About Grey-Box Attacks [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Estuardo Alpirez Bock +8 more
openaire +2 more sources
On Recovering Affine Encodings in White-Box Implementations
Ever since the first candidate white-box implementations by Chow et al. in 2002, producing a secure white-box implementation of AES has remained an enduring challenge.
Patrick Derbez +3 more
doaj +1 more source
Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core +3 more sources

